c3df8d7562
Currently, /system/xbin/su is world executable. Prior to SELinux enforcement, anyone (including third party apps) could run su. The su code itself checks to see if the calling UID is root or shell. Rather than relying on enforcement within the su binary, modify the binary so it has group=shell, and remove world-execute permission. This helps avoid some annoying SELinux denial messages as third party apps call su on userdebug/eng builds. Change-Id: I61c9231bb7e201d14ee3a5b6fe81b3fa7b12599f |
||
---|---|---|
.. | ||
android | ||
backtrace | ||
ctest | ||
cutils | ||
diskconfig | ||
log | ||
memtrack | ||
mincrypt | ||
netutils | ||
pixelflinger | ||
private | ||
system | ||
sysutils | ||
usbhost | ||
utils | ||
ziparchive | ||
zipfile |